An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.
☆16Aug 28, 2015Updated 10 years ago
Alternatives and similar repositories for node-reverse-trojan
Users that are interested in node-reverse-trojan are comparing it to the libraries listed below
Sorting:
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 10 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 8 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- AlMA.PRO.SPY - An open-source Botnet.☆15Jul 25, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Zero-Day Code Injection and Persistence Technique☆30Mar 23, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- Automating x64dbg using Python☆36Sep 20, 2015Updated 10 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 12 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- A simple port forwarding utility for TCP and UDP☆14Oct 7, 2013Updated 12 years ago
- A javascript single page application (SPA) driver for REST API payload management.☆17Jul 18, 2024Updated last year
- Full nodejs Remote Administration Tools with socket.io☆30Jun 11, 2017Updated 8 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Mobile Device Management for Android☆53Apr 2, 2021Updated 4 years ago